CVE-2021-1397
| Summary |
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge.
|
| Publication Date |
May 6, 2021, 10:15 p.m. |
| Registration Date |
May 7, 2021, 10 a.m. |
| Last Update |
Nov. 21, 2024, 2:44 p.m. |
|
CVSS3.1 : MEDIUM
|
| スコア |
6.1
|
| Vector |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
不要 |
| 利用者の関与(UI) |
要 |
| 影響の想定範囲(S) |
変更あり |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
なし |
|
CVSS2.0 : MEDIUM
|
| Score |
5.8
|
| Vector |
AV:N/AC:M/Au:N/C:P/I:P/A:N |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
中 |
| 攻撃前の認証要否(Au) |
不要 |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
なし |
| Get all privileges. |
いいえ
|
| Get user privileges |
いいえ
|
| Get other privileges |
いいえ
|
| User operation required |
はい
|
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:* |
|
4.1\(3b\) |
|
|
| cpe:2.3:a:cisco:integrated_management_controller:*:*:*:*:*:*:*:* |
|
|
|
3.2\(12.4\) |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:encs_5100_firmware:*:*:*:*:*:*:*:* |
|
4.4.2 |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:* |
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:encs_5400_firmware:*:*:*:*:*:*:*:* |
|
4.4.2 |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:* |
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c220_m6_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c220_m6:-:*:*:*:*:*:*:* |
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c225_m6_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c225_m6:-:*:*:*:*:*:*:* |
| Configuration6 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c240_m6_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c240_m6:-:*:*:*:*:*:*:* |
| Configuration7 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c245_m6_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c245_m6:-:*:*:*:*:*:*:* |
| Configuration8 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c125_m5_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c125_m5:-:*:*:*:*:*:*:* |
| Configuration9 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c220_m5_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c220_m5:-:*:*:*:*:*:*:* |
| Configuration10 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c240_m5_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c240_m5:-:*:*:*:*:*:*:* |
| Configuration11 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c480_m5_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c480_m5:-:*:*:*:*:*:*:* |
| Configuration12 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:c480_ml_m5_firmware:*:*:*:*:*:*:*:* |
|
4.1\(2f\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:c480_ml_m5:-:*:*:*:*:*:*:* |
| Configuration13 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e140s_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e140s:-:*:*:*:*:*:*:* |
| Configuration14 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e140d_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e140d:-:*:*:*:*:*:*:* |
| Configuration15 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e160d_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e160d:-:*:*:*:*:*:*:* |
| Configuration16 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e160s-m3_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e160s-m3:-:*:*:*:*:*:*:* |
| Configuration17 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e180d-m3_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e180d-m3:-:*:*:*:*:*:*:* |
| Configuration18 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e1120d-m3_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e1120d-m3:-:*:*:*:*:*:*:* |
| Configuration19 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e140s-m2_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e140s-m2:-:*:*:*:*:*:*:* |
| Configuration20 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e160d_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e160d:-:*:*:*:*:*:*:* |
| Configuration21 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e180d-m2_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e180d-m2:-:*:*:*:*:*:*:* |
| Configuration22 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e140s-m1_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e140s-m1:-:*:*:*:*:*:*:* |
| Configuration23 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e140d_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e140d:-:*:*:*:*:*:*:* |
| Configuration24 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e140dp_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e140dp:-:*:*:*:*:*:*:* |
| Configuration25 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e160d_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e160d:-:*:*:*:*:*:*:* |
| Configuration26 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs-e160dp-m1_firmware:*:*:*:*:*:*:*:* |
|
3.2\(11.5\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs-e160dp-m1:-:*:*:*:*:*:*:* |
| Configuration27 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:ucs_s3260_firmware:*:*:*:*:*:*:*:* |
|
4.0\(2o\) |
|
|
| execution environment |
| 1 |
cpe:2.3:h:cisco:ucs_s3260:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List
JVN Vulnerability Information
Cisco Integrated Management Controller ソフトウェアにおけるオープンリダイレクトの脆弱性
| Title |
Cisco Integrated Management Controller ソフトウェアにおけるオープンリダイレクトの脆弱性
|
| Summary |
Cisco Integrated Management Controller (IMC) ソフトウェアには、オープンリダイレクトの脆弱性が存在します。
|
| Possible impacts |
情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
May 5, 2021, midnight |
| Registration Date |
Jan. 14, 2022, 12:03 p.m. |
| Last Update |
Jan. 14, 2022, 12:03 p.m. |
Affected System
| シスコシステムズ |
|
C125 M5 ファームウェア
|
|
C220 M5 ファームウェア
|
|
C220 M6 ファームウェア
|
|
C225 M6 ファームウェア
|
|
C240 M5 ファームウェア
|
|
C245 M6 ファームウェア
|
|
Cisco Integrated Management Controller
|
|
Cisco UCS Manager
|
|
ENCS 5100 ファームウェア
|
|
ENCS 5400 ファームウェア
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2022年01月14日] 掲載 |
Jan. 14, 2022, 12:03 p.m. |